S2W launches cyber threat intelligence platform ‘Quasar’

S2W (https://s2w.inc/) announced the launch of ‘Quaxar’, a cyber threat intelligence (CTI) platform.

Quasar is an upgraded version of the existing ‘Xarvis Enterprise’ and provides an optimal environment for performing CTI tasks. It provides customized intelligence to users by refining only the essential parts of information collected from various sources such as the dark web and deep web.

Quasar utilizes dark web and deep web employee leaked account information, ransomware attack status, brand impersonation information, and advanced persistent threat (APT) attack group information, etc. ) can operate the management environment.

In addition, it has strong defenses, such as automatically detecting numerous attack surfaces that are difficult to identify inside the enterprise, and supports overall tasks required for cyber threat intelligence.

Furthermore, by creating an ecosystem (QUINTES, QUaxar INTelligence Eco System) that can share key information such as attack-related intelligence between companies using Quasar, it plans to strengthen its role as a pivot for a more rapid and effective joint response.

Quasar’s main services include ▲Digital Risk Protection ▲Data Breach Detection ▲Active Threat & Vulnerability Management.

Dynamic threat and vulnerability management service quickly provides meaningful countermeasures against various external threats. It provides Indicators of Compromise (IOC) for proactive prevention of cyber threat situations, and even in the event of an accident, resilience can be secured through prompt support from a security expert team.

S2W will continue to expand its threat detection channel through cooperation with various domestic and foreign security companies and organizations through Quasar. In fact, S2W provides Interpol with a dark web analysis service for the first time as a domestic security company to support the use of dark web and cryptocurrency investigation data that require international cooperation.
[email protected]


Source: ITWorld Korea by www.itworld.co.kr.

*The article has been translated based on the content of ITWorld Korea by www.itworld.co.kr. If there is any problem regarding the content, copyright, please leave a report below the article. We will try to process as quickly as possible to protect the rights of the author. Thank you very much!

*We just want readers to access information more quickly and easily with other multilingual content, instead of information only available in a certain language.

*We always respect the copyright of the content of the author and always include the original link of the source article.If the author disagrees, just leave the report below the article, the article will be edited or deleted at the request of the author. Thanks very much! Best regards!